{"report_id":"771846d7-33bb-4247-a3b2-471b407190df","version":6,"status":"done","tags":["malware"],"date":"2024-11-02T17:42:47Z","url":{"schema":"http","addr":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","fqdn":"5.178.1.19","domain":"5.178.1.19","tld":""},"ip":{"addr":"5.178.1.19","port":0,"asn":211059,"as":"Tribeka Web Advisors S.A.","country":"Azerbaijan","country_code":"AZ"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"","expires_at":"2027-01-11T17:42:47Z","useragent":"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"5.178.1.19","ip":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"domain_registered":"unknown","domain_rank":0,"first_seen":"No data","last_seen":"No data","alert_count":7,"request_count":1,"received_data":608386,"sent_data":409,"comment":"","tags":null,"fingerprints":null}],"files":null,"artifacts":{"windows_shortcuts":null,"files":[{"md5":"c8fd9be83bc728cc04beffafc2907fe9","sha1":"95ab9f701e0024cedfbd312bcfe4e726744c4f2e","sha256":"ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a","sha512":"fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040","magic":"PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections","size":608080,"url":{"schema":"http","addr":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","fqdn":"5.178.1.19","domain":"5.178.1.19","tld":""},"ip":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-02","alert":"files - file ~tmp01925d3f.exe","trigger":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-02","alert":"pe_detect_tls_callbacks","trigger":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"date":"2024-07-26","rule":"pe_detect_tls_callbacks","yarahub_license":"CC0 1.0","yarahub_reference_md5":"13794d1d8e87c69119237256ef068043","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"881c8cad-35ef-414d-8906-0f98f7b37cd6"}}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":[{"sensor_name":"suricata","title":"","description":"","date":"2024-11-02T17:42:22Z","timestamp":1730569342,"ip_dst":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"ip_src":{"addr":"172.18.0.12","port":49178,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Dotted Quad Host DLL Request","source":"{\"timestamp\":\"2024-11-02T17:42:22.481472+0000\",\"flow_id\":33246880365206,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.12\",\"src_port\":49178,\"dest_ip\":\"5.178.1.19\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.dll\"],\"flowints\":{\"ET.infostealer.dll.download\":1}},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2027250,\"rev\":4,\"signature\":\"ET INFO Dotted Quad Host DLL Request\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_Endpoint\"],\"created_at\":[\"2019_04_23\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Moderate\"],\"signature_severity\":[\"Minor\"],\"updated_at\":[\"2020_04_08\"]}},\"http\":{\"hostname\":\"5.178.1.19\",\"url\":\"/5ffb0d4b87b11580/mozglue.dll\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_content_type\":\"application/x-msdos-program\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1140},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":683,\"bytes_toclient\":6196,\"start\":\"2024-11-02T17:42:22.424598+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-11-02T17:42:22Z","timestamp":1730569342,"ip_dst":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"ip_src":{"addr":"172.18.0.12","port":49178,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity","source":"{\"timestamp\":\"2024-11-02T17:42:22.481472+0000\",\"flow_id\":33246880365206,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.12\",\"src_port\":49178,\"dest_ip\":\"5.178.1.19\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.dll\"],\"flowints\":{\"ET.infostealer.dll.download\":1}},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2044302,\"rev\":1,\"signature\":\"ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity\",\"category\":\"A suspicious filename was detected\",\"severity\":2,\"metadata\":{\"affected_product\":[\"Windows_XP_Vista_7_8_10_Server_32_64_Bit\"],\"attack_target\":[\"Client_Endpoint\"],\"confidence\":[\"Low\"],\"created_at\":[\"2023_02_22\"],\"deployment\":[\"SSLDecrypt\",\"Perimeter\"],\"performance_impact\":[\"Low\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2023_02_22\"]}},\"http\":{\"hostname\":\"5.178.1.19\",\"url\":\"/5ffb0d4b87b11580/mozglue.dll\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_content_type\":\"application/x-msdos-program\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1140},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":683,\"bytes_toclient\":6196,\"start\":\"2024-11-02T17:42:22.424598+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-11-02T17:42:22Z","timestamp":1730569342,"ip_dst":{"addr":"172.18.0.12","port":49178,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"severity":"high","alert":"ET POLICY PE EXE or DLL Windows file download HTTP","source":"{\"timestamp\":\"2024-11-02T17:42:22.540731+0000\",\"flow_id\":33246880365206,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"5.178.1.19\",\"src_port\":80,\"dest_ip\":\"172.18.0.12\",\"dest_port\":49178,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.dll\",\"ET.http.binary\"],\"flowints\":{\"ET.infostealer.dll.download\":1}},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2018959,\"rev\":4,\"signature\":\"ET POLICY PE EXE or DLL Windows file download HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2014_08_19\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2023_04_12\"]}},\"http\":{\"hostname\":\"5.178.1.19\",\"url\":\"/5ffb0d4b87b11580/mozglue.dll\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_content_type\":\"application/x-msdos-program\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43132},\"files\":[{\"filename\":\"/5ffb0d4b87b11580/mozglue.dll\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43132,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":20,\"pkts_toclient\":33,\"bytes_toserver\":1739,\"bytes_toclient\":47074,\"start\":\"2024-11-02T17:42:22.424598+0000\"}}"}]}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-02","alert":"files - file ~tmp01925d3f.exe","trigger":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-02","alert":"pe_detect_tls_callbacks","trigger":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"date":"2024-07-26","rule":"pe_detect_tls_callbacks","yarahub_license":"CC0 1.0","yarahub_reference_md5":"13794d1d8e87c69119237256ef068043","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"881c8cad-35ef-414d-8906-0f98f7b37cd6"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"mnemonic_dns","type":"domain","description":"Mnemonic Secure DNS","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2024-11-02","alert":"Sinkholed","trigger":"5.178.1.19","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}]},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":[{"sensor_name":"urlquery","alert":"Malware - Possible Infostealer Payload","verdict":"malware","severity":"high","comment":"","tags":["malware"],"meta":null}]},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"http","addr":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","fqdn":"5.178.1.19","domain":"5.178.1.19","tld":""},"ip":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"is_navigation_request":true,"resource_type":"document","requested_by":"","date":"2024-11-02T17:42:22.425Z","timestamp":1730569342425,"http_version":"HTTP/1.1","security_state":"insecure","security_info":null,"request":{"raw":"GET /5ffb0d4b87b11580/mozglue.dll HTTP/1.1\r\nHost: 5.178.1.19\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nDNT: 1\r\nConnection: keep-alive\r\nUpgrade-Insecure-Requests: 1\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/1.1 200 OK\r\nDate: Sat, 02 Nov 2024 17:42:22 GMT\r\nServer: Apache/2.4.41 (Ubuntu)\r\nLast-Modified: Mon, 05 Sep 2022 10:49:08 GMT\r\nETag: \"94750-5e7ebd4425100\"\r\nAccept-Ranges: bytes\r\nContent-Length: 608080\r\nKeep-Alive: timeout=5, max=100\r\nConnection: Keep-Alive\r\nContent-Type: application/x-msdos-program\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":608080,"size_decoded":608080,"mime_type":"application/x-msdos-program","magic":"PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections","md5":"c8fd9be83bc728cc04beffafc2907fe9","sha1":"95ab9f701e0024cedfbd312bcfe4e726744c4f2e","sha256":"ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a","sha512":"fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040","ssdeep":"12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br","tlshash":"40d4ae03e9d450f6e95239b2302feb3e953427368b3488c7c7e46d955b356d2a2bb702","first_seen":"2023-04-05T09:00:05Z","last_seen":"2025-03-23T19:07:43.95057Z","times_seen":1364,"resource_available":false,"data":null}},"time_used":279,"timings":{"blocked":28,"dns":0,"connect":28,"send":0,"wait":30,"receive":193,"ssl":0},"alerts":{"ids":[{"sensor_name":"suricata","title":"","description":"","date":"2024-11-02T17:42:22Z","timestamp":1730569342,"ip_dst":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"ip_src":{"addr":"172.18.0.12","port":49178,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET INFO Dotted Quad Host DLL Request","source":"{\"timestamp\":\"2024-11-02T17:42:22.481472+0000\",\"flow_id\":33246880365206,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.12\",\"src_port\":49178,\"dest_ip\":\"5.178.1.19\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.dll\"],\"flowints\":{\"ET.infostealer.dll.download\":1}},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2027250,\"rev\":4,\"signature\":\"ET INFO Dotted Quad Host DLL Request\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"attack_target\":[\"Client_Endpoint\"],\"created_at\":[\"2019_04_23\"],\"deployment\":[\"Perimeter\"],\"performance_impact\":[\"Moderate\"],\"signature_severity\":[\"Minor\"],\"updated_at\":[\"2020_04_08\"]}},\"http\":{\"hostname\":\"5.178.1.19\",\"url\":\"/5ffb0d4b87b11580/mozglue.dll\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_content_type\":\"application/x-msdos-program\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1140},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":683,\"bytes_toclient\":6196,\"start\":\"2024-11-02T17:42:22.424598+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-11-02T17:42:22Z","timestamp":1730569342,"ip_dst":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"ip_src":{"addr":"172.18.0.12","port":49178,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity","source":"{\"timestamp\":\"2024-11-02T17:42:22.481472+0000\",\"flow_id\":33246880365206,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.12\",\"src_port\":49178,\"dest_ip\":\"5.178.1.19\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.dll\"],\"flowints\":{\"ET.infostealer.dll.download\":1}},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2044302,\"rev\":1,\"signature\":\"ET HUNTING HTTP GET Request for mozglue.dll - Possible Infostealer Activity\",\"category\":\"A suspicious filename was detected\",\"severity\":2,\"metadata\":{\"affected_product\":[\"Windows_XP_Vista_7_8_10_Server_32_64_Bit\"],\"attack_target\":[\"Client_Endpoint\"],\"confidence\":[\"Low\"],\"created_at\":[\"2023_02_22\"],\"deployment\":[\"SSLDecrypt\",\"Perimeter\"],\"performance_impact\":[\"Low\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2023_02_22\"]}},\"http\":{\"hostname\":\"5.178.1.19\",\"url\":\"/5ffb0d4b87b11580/mozglue.dll\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_content_type\":\"application/x-msdos-program\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1140},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":683,\"bytes_toclient\":6196,\"start\":\"2024-11-02T17:42:22.424598+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-11-02T17:42:22Z","timestamp":1730569342,"ip_dst":{"addr":"172.18.0.12","port":49178,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"5.178.1.19","port":80,"asn":0,"as":"","country":"Azerbaijan","country_code":"AZ"},"severity":"high","alert":"ET POLICY PE EXE or DLL Windows file download HTTP","source":"{\"timestamp\":\"2024-11-02T17:42:22.540731+0000\",\"flow_id\":33246880365206,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"5.178.1.19\",\"src_port\":80,\"dest_ip\":\"172.18.0.12\",\"dest_port\":49178,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"http.dottedquadhost.dll\",\"ET.http.binary\"],\"flowints\":{\"ET.infostealer.dll.download\":1}},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2018959,\"rev\":4,\"signature\":\"ET POLICY PE EXE or DLL Windows file download HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"confidence\":[\"High\"],\"created_at\":[\"2014_08_19\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2023_04_12\"]}},\"http\":{\"hostname\":\"5.178.1.19\",\"url\":\"/5ffb0d4b87b11580/mozglue.dll\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_content_type\":\"application/x-msdos-program\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43132},\"files\":[{\"filename\":\"/5ffb0d4b87b11580/mozglue.dll\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43132,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":20,\"pkts_toclient\":33,\"bytes_toserver\":1739,\"bytes_toclient\":47074,\"start\":\"2024-11-02T17:42:22.424598+0000\"}}"}],"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-02","alert":"files - file ~tmp01925d3f.exe","trigger":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"author":"The DFIR Report","date":"2021-02-22","description":"files - file ~tmp01925d3f.exe","hash1":"10ff83629d727df428af1f57c524e1eaddeefd608c5a317a5bfc13e2df87fb63","reference":"https://thedfirreport.com","rule":"cobalt_strike_tmp01925d3f","score":"80","yarahub_license":"CC0 1.0","yarahub_reference_md5":"1c6ba04dc9808084846ac1005deb9c85","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"58ae3b15-154e-47e9-a24c-c8b885a4cd55"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"YARAhub by abuse.ch","scan_date":"2024-11-02","alert":"pe_detect_tls_callbacks","trigger":"5.178.1.19/5ffb0d4b87b11580/mozglue.dll","verdict":"malware","severity":"medium","comment":"","link":"https://yaraify.abuse.ch/yarahub/","meta":{"date":"2024-07-26","rule":"pe_detect_tls_callbacks","yarahub_license":"CC0 1.0","yarahub_reference_md5":"13794d1d8e87c69119237256ef068043","yarahub_rule_matching_tlp":"TLP:WHITE","yarahub_rule_sharing_tlp":"TLP:WHITE","yarahub_uuid":"881c8cad-35ef-414d-8906-0f98f7b37cd6"}},{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2024-11-02","alert":"Sinkholed","trigger":"5.178.1.19","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}],"urlquery":[{"sensor_name":"urlquery","alert":"Malware - Possible Infostealer Payload","verdict":"malware","severity":"high","comment":"","tags":["malware"],"meta":null}]}}]}
